Fighting Cyber-Enabled Fraud 2025

Page 17 of 31 · WEF_Fighting_Cyber-Enabled_Fraud_2025.pdf

infrastructure operators should deploy back-end protective measures preventing users from reaching malicious sites entirely. Internet service providers and network operators should offer protective DNS as default, drawing from shared threat intelligence feeds updated in real time. Browsers and security software should implement block- listing mechanisms that prevent access to known malicious domains. Success requires coordinated action among certificate authorities, browser vendors, DNS providers and regulators. Belgium’s Safeonweb: A model for browser trust signals BOX 6 Centre for Cybersecurity Belgium developed the Safeonweb browser58 extension to help citizens assess website trustworthiness through simple visual indicators. The extension displays colour- coded signals for every website visited: green indicates that the owner has been validated, orange shows that the owner cannot be verified and red warns that the site is known to be malicious or insecure. Organizations with a Belgian Enterprise Number can register their domains for free on the Safeonweb@Work platform. The system integrates real-time threat intelligence – if a validated site is compromised, its status immediately changes to orange or red. The extension analyses the certificate validation level, the certificate authority that issued it and whether the domain is registered as malicious. With more than 50,000 users, the extension demonstrates how government-led initiatives can combine organizational verification with active threat monitoring. The programme’s success suggests that similar national or regional initiatives could scale globally with proper coordination and interoperability standards. Action 5 – Strengthen user protections against messaging and voice phishing: Telecommunications providers and messaging platforms should strengthen safeguards that alert and empower users against text and voice phishing. For verified business communications, they should establish mandatory sender verification standards across RCS implementations that use existing trust infrastructures – such as Certificate Authority Extended Validation and governmental digital identity programmes (e.g. eIDAS) – displaying prominent visual indicators including logos and verified checkmarks. As called out by Europol in its new position paper on caller ID spoofing, international coordination on interoperable technical standards is essential for cross-border effectiveness.59 Building on existing mobile network industry baseline controls for preventing unsolicited messaging traffic,60 for unknown senders, devices should display default warnings with blocking and reporting options, flagging patterns associated with phishing such as fake delivery notifications or suspicious links. Organizations should deploy AI-powered detection systems to identify emerging fraud campaigns and provide contextual risk warnings to users. Voice protection measures can be enhanced by combining caller authentication with real-time fraud scoring, helping to flag suspicious activity as it happens. These security efforts should be carefully balanced with usability, ensuring that protections remain accessible and supported by clear user education.Action 6 – Accelerate phishing-resistant authentication and harden legacy methods: Traditional multifactor authentication (MFA) has improved account security and reduced fraud and account takeover but attackers increasingly bypass it. Phishing-resistant solutions such as passkeys offer far greater protection and meet US National Institute of Standards and Technology (NIST) and European Union Agency for Cybersecurity (ENISA) high assurance standards. Yet most regulations still mandate outdated MFA technologies. Governments should design regulations driving adoption of phishing-resistant authentication, rewarding providers who implement state-of-the-art safeguards. Meanwhile, legacy methods such as SMS one-time passwords will persist, particularly in emerging markets and must be systematically hardened.61 Telecommunications providers should strengthen validation standards, secure delivery channels and enforce sender ID registries to block spoofing.62 Regulators must reinforce these with mandatory anti-spoofing controls and oversight. Achieving this in practice necessitates an evaluation of the associated costs and benefits. Until phishing- resistant methods achieve universal adoption, coordinated action by telecommunication providers, online platforms and regulators is essential to ensure that legacy mechanisms deliver the strongest possible protection. Fighting Cyber-Enabled Fraud: A Systemic Defence Approach 17
Ask AI what this page says about a topic: